MAX_BPF_STACK 293 arch/mips/net/ebpf_jit.c BUILD_BUG_ON(MAX_BPF_STACK & 7); MAX_BPF_STACK 294 arch/mips/net/ebpf_jit.c locals_size = (ctx->flags & EBPF_SEEN_FP) ? MAX_BPF_STACK : 0; MAX_BPF_STACK 831 arch/mips/net/ebpf_jit.c emit_instr(ctx, daddiu, dst, MIPS_R_SP, MAX_BPF_STACK); MAX_BPF_STACK 834 arch/mips/net/ebpf_jit.c emit_instr(ctx, daddiu, MIPS_R_AT, MIPS_R_SP, MAX_BPF_STACK); MAX_BPF_STACK 1365 arch/mips/net/ebpf_jit.c mem_off = insn->off + MAX_BPF_STACK; MAX_BPF_STACK 1396 arch/mips/net/ebpf_jit.c mem_off = insn->off + MAX_BPF_STACK; MAX_BPF_STACK 1431 arch/mips/net/ebpf_jit.c mem_off = insn->off + MAX_BPF_STACK; MAX_BPF_STACK 270 arch/x86/net/bpf_jit_comp.c EMIT2_off32(0x8B, 0x85, -36 - MAX_BPF_STACK); /* mov eax, dword ptr [rbp - 548] */ MAX_BPF_STACK 276 arch/x86/net/bpf_jit_comp.c EMIT2_off32(0x89, 0x85, -36 - MAX_BPF_STACK); /* mov dword ptr [rbp -548], eax */ MAX_BPF_STACK 277 kernel/bpf/hashtab.c if (attr->key_size > MAX_BPF_STACK) MAX_BPF_STACK 284 kernel/bpf/hashtab.c MAX_BPF_STACK - sizeof(struct htab_elem)) MAX_BPF_STACK 2139 kernel/bpf/verifier.c if (off >= 0 || off < -MAX_BPF_STACK) { MAX_BPF_STACK 2619 kernel/bpf/verifier.c if (depth > MAX_BPF_STACK) { MAX_BPF_STACK 2949 kernel/bpf/verifier.c if (off >= 0 || off < -MAX_BPF_STACK || off + access_size > 0 || MAX_BPF_STACK 4251 kernel/bpf/verifier.c *ptr_limit = MAX_BPF_STACK + off; MAX_BPF_STACK 6763 kernel/bpf/verifier.c #define ID_MAP_SIZE (MAX_BPF_REG + MAX_BPF_STACK / BPF_REG_SIZE) MAX_BPF_STACK 9096 kernel/bpf/verifier.c env->prog->aux->stack_depth = MAX_BPF_STACK; MAX_BPF_STACK 623 net/core/bpf_sk_storage.c MAX_BPF_STACK - sizeof(struct bpf_sk_storage_elem) || MAX_BPF_STACK 546 net/core/filter.c BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MAX_BPF_STACK); MAX_BPF_STACK 1625 net/core/filter.c __be32 diff[MAX_BPF_STACK / sizeof(__be32)]; MAX_BPF_STACK 1626 net/core/filter.c u8 buff[MAX_BPF_STACK]; MAX_BPF_STACK 816 net/core/sock_map.c if (attr->key_size > MAX_BPF_STACK)